Stepping stone detection for tracing attack sources in software-defined networks

dc.contributorAalto-yliopistofi
dc.contributorAalto Universityen
dc.contributor.advisorGurtov, Andrei
dc.contributor.authorBhattacherjee, Debopam
dc.contributor.schoolPerustieteiden korkeakoulufi
dc.contributor.supervisorAura, Tuomas
dc.date.accessioned2016-08-26T09:02:39Z
dc.date.available2016-08-26T09:02:39Z
dc.date.issued2016-07-29
dc.description.abstractStepping stones are compromised hosts in a network which can be used by hackers and other malicious attackers to hide the origin of connections. Attackers hop from one compromised host to another to form a chain of stepping stones before launching attack on the actual victim host. Various timing and content based detection techniques have been proposed in the literature to trace back through a chain of stepping stones in order to identify the attacker. This has naturally led to evasive strategies such as shaping the traffic differently at each hop. The evasive techniques can also be detected. Our study aims to adapt some of the existing stepping stone detection and anti-evasion techniques to software-defined networks which use network function virtualization. We have implemented the stepping-stone detection techniques in a simulated environment and uses Flow for the traffic monitoring at the switches. We evaluate the detection algorithms on different network topologies and analyze the results to gain insight on the effectiveness of the detection mechanisms. The selected detection techniques work well on relatively high packet sampling rates. However, new solutions will be needed for large SDN networks where the packet sampling rate needs to be lower.en
dc.format.extent68 + 0
dc.format.mimetypeapplication/pdfen
dc.identifier.urihttps://aaltodoc.aalto.fi/handle/123456789/21582
dc.identifier.urnURN:NBN:fi:aalto-201608263038
dc.language.isoenen
dc.programmeMaster's Degree Programme in Security and Mobile Computing (NordSecMob)fi
dc.programme.majorMobile Computing, Service and Securityfi
dc.programme.mcodeSCI3071fi
dc.rights.accesslevelopenAccess
dc.subject.keywordstepping stone attacken
dc.subject.keywordnetwork function virtualizationen
dc.subject.keywordnetwork monitoringen
dc.titleStepping stone detection for tracing attack sources in software-defined networksen
dc.typeG2 Pro gradu, diplomityöfi
dc.type.okmG2 Pro gradu, diplomityö
dc.type.ontasotMaster's thesisen
dc.type.ontasotDiplomityöfi
dc.type.publicationmasterThesis
local.aalto.idinssi54250
local.aalto.inssiarchivenr5406
local.aalto.inssilocationP1 Ark Aalto
local.aalto.openaccessyes

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
master_Bhattacherjee_Debopam_2016.pdf
Size:
1.12 MB
Format:
Adobe Portable Document Format